TITLE

Information Age Education, Training and Awareness

AUTHOR(S)
Appel, Ed
PUB. DATE
September 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Sep2009, Vol. 46 Issue 9, p113
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers information on the proper way to use the information technology (IT) resources in the U.S. The personnel and IT security programs need to be change in order to improve education and training on information security systems. It has been cited that future misbehavior will be handled with the appropriate punishment considering that the Internet provides both positive and negative information.
ACCESSION #
44064725

 

Related Articles

  • Choice and Chance: A Conceptual Model of Paths to Information Security Compromise. Ransbotham, Sam; Mitra, Sabyasachi // Information Systems Research;Mar2009, Vol. 20 Issue 1, p121 

    No longer the exclusive domain of technology experts, information security is now a management issue. Through a grounded approach using interviews, observations, and secondary data, we advance a model of the information security compromise process from the perspective of the attacked...

  • Protecting Information Privacy When Retiring Old Computers. Lunsford, Dale L.; Robbins, Walter A.; Bizarro, Pascal A. // CPA Journal;Jul2004, Vol. 74 Issue 7, p60 

    Considers several factors in protecting information privacy when retiring old computers. Cases of confidential information being made available through the retiring of old computers; Areas of danger; Measures to prevent the access of information.

  • Familiarity with information security management system. Nakhaie, Hamid; Zadeh, Asma Esmail // International Proceedings of Economics Development & Research;2011, Vol. 13, p349 

    It seems that various organizations with regard to the importance of their current information role need to a strong management to preserve the security of this information. Information security refers to information conservation and minimization of illegal access to them. Information security...

  • How to secure your small business. Kidman, Angus // Australian PC User;Jun2007, Vol. 19 Issue 6, p41 

    The article presents advice on how to protect one's business information technology (IT) without spending too much. One option is to farm out IT security management to managed services, which monitors incoming electronic mail to eliminate spam and malware before it arrives, or cover the entire...

  • Incident Response and User Awareness. Sveen, Finn Olav; Sarriegi, Jose Mari; Gonzalez, Jose J. // Norwegian Information Security Conference / Norsk Informasjonssi;Nov2009, p161 

    The importance of user awareness for information security is widely recognized in the information security management literature. However, there are few empirical studies of user awareness; most studies only use conceptual approaches. Concerning practical advice, many books and papers only...

  • Two cups honey, one dash vinegar. Davidson, Mary Ann // SC Magazine: For IT Security Professionals (UK Edition);Apr2005, p18 

    This article describes how an efficient security program can be built through training and persuasion, which work better than threats. The success of security programs often depends on someone other than the high priests of security. Building a security culture is like evangelism. If one...

  • Management must back IT security, say experts. Goodwill, Bill // Computer Weekly;10/31/2006, p8 

    The article presents information on a study that finds facts related to the security policies in the information technology (IT) industry. The study, conducted jointly by International Information Systems Security Certification Consortium and IDC, has revealed that the security specialists rank...

  • SAFE, SECURE AND UP TO STANDARD. Williams, Paul // Accountancy;Apr95, Vol. 115 Issue 1220, p60 

    Focuses on the management of information technology security in organizations in Great Britain. Reliance of organizations in information systems; Cost of security breaches; Examples of security failures; Publication of the Code of Practice for Information Security Management in Great Britain;...

  • Security Convergence - The Future can be found in the Past. Elliott, David // Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p68 

    The article offers the author's insights on physical security and information technology (IT) security. He says that the physical security and IT security cannot be combined due to the decentralization of computing resources and the Voice Over Internet Protocol (VoIP). He cites that the two will...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics